JOHN W HARRISON
Nursing at Buescher Hl St, Melbourne, FL

License number
Florida 740682
Issued Date
Nov 15, 1974
Effective Date
Mar 8, 2010
Expiration Date
Jul 31, 1998
Category
Health Care
Type
Registered Nurse
Address
Address
2093 Buescher Hill St, Melbourne, FL 32935

Personal information

See more information about JOHN W HARRISON at radaris.com
Name
Address
Phone
John Harrison, age 59
4835 Sunderland Rd, Jacksonville, FL 32210
(904) 387-6469
John Harrison, age 56
4830 NW 92Nd Ter, Coral Springs, FL 33067
John Harrison, age 74
4751 Coconut Palm Cir NE, Saint Petersburg, FL 33703
(828) 650-7104
John Harrison
498 Drake Acres Rd, Quincy, FL 32351
(850) 528-6900
John Harrison, age 102
5083 Old Hickory Cir, Marianna, FL 32446
(850) 902-2083

Professional information

See more information about JOHN W HARRISON at trustoria.com
John Harrison Photo 1
Manufacturing Engineer At Harris Rf Communications

Manufacturing Engineer At Harris Rf Communications

Position:
Manufacturing Engineer at Harris RF Communications
Location:
Melbourne, Florida Area
Industry:
Defense & Space
Work:
Harris RF Communications - Manufacturing Engineer


John Harrison Photo 2
Network Surveillance System

Network Surveillance System

US Patent:
5991881, Nov 23, 1999
Filed:
Nov 8, 1996
Appl. No.:
8/744848
Inventors:
David Allen Conklin - San Antonio TX
John Reed Harrison - Palm Bay FL
Assignee:
Harris Corporation - Melbourne FL
International Classification:
G06F 1100
US Classification:
713201
Abstract:
This is a system and method for network surveillance and detection of attempted intrusions, or intrusions, into the network and into computers connected to the network. The System functions are: (A) intrusion detection monitoring, (B) real-time alert, (C) logging of potential unauthorized activity, and (D) incident progress analysis and reporting. Upon detection of any attempts to intrude, the System will initiate a log of all activity between the computer elements involved and send an alert to a monitoring console. When a log is initiated, the network continues to be monitored by a primary surveillance system. A secondary monitoring process is started which interrogates the activity log in real-time and sends additional alerts reporting the progress of the suspected intruder.